Azure Arc & Microsoft Defender Integration

Automated Security Visibility for Enterprise Infrastructure

📖 15 min read
🎯 Advanced
🔧 PowerShell Solution
💡 Azure Arc + MDE Integration

Introduction

Azure Arc servers get deployed, but tracking which ones are actually protected by Microsoft Defender for Endpoint becomes a manual nightmare. You have hundreds of Arc-enabled servers across subscriptions, but no visibility into security coverage gaps until an incident happens.

This automated integration solution discovers all Azure Arc servers, cross-references them with Microsoft Defender for Endpoint enrollment, and applies security tags directly in the Azure portal. Know instantly which servers are protected, their risk scores, and when they last checked in.

Azure Arc servers with automated Microsoft Defender security tags applied

Automated security tags applied to Azure Arc servers showing MDE enrollment status, risk scores, and last seen timestamps

The Visibility Problem

Arc server deployments scale fast, but security enrollment tracking doesn't keep up:

  • Coverage gaps - Arc servers deployed without MDE protection
  • Manual checking - No automated way to verify MDE enrollment status
  • No governance - Can't use Azure Policy without proper security tags
  • Risk blindness - Don't know which servers have high exposure levels
  • Incident delays - Only discover unprotected servers during security events

Solution Overview

This Azure Arc & MDE integration solution uses Azure Resource Graph to discover all Arc-enabled servers, validates each one against Microsoft Defender for Endpoint APIs, and automatically tags resources with security status information.

Technology Integration

  • Azure Automation - PowerShell runbook with managed identity authentication
  • Azure Resource Graph - Fast cross-subscription Arc server discovery with pagination
  • Microsoft Defender API - Real-time enrollment validation and security metrics
  • Azure RBAC - Secure permissions for resource discovery and tagging

The solution runs on schedule, discovers all Azure Arc servers across your tenant, validates MDE enrollment status, and applies detailed security tags for governance and policy enforcement.

Architecture & Automation Flow

The security validation follows a four-step automated process:

  1. Discovery Phase - Azure Resource Graph queries all Arc servers with pagination support
  2. Enrollment Validation - Each server cross-referenced against Microsoft Defender for Endpoint
  3. Security Assessment - Risk scores, exposure levels, and last seen timestamps retrieved
  4. Tag Application - Arc resources automatically tagged with comprehensive security metadata
Automation Components: Azure Automation runbook, Resource Graph queries, MDE API integration, managed identity authentication, and configurable security policies.

Key Features

🔍 Arc Server Discovery

Automatically discovers all Azure Arc-enabled servers across subscriptions using Azure Resource Graph with pagination support for enterprise environments.

🛡️ MDE Enrollment Validation

Cross-references each Arc server against Microsoft Defender for Endpoint to verify protection status and retrieve security metrics.

🏷️ Automated Security Tagging

Applies MDE enrollment status, risk scores, exposure levels, and last seen timestamps directly to Arc resources as Azure tags.

📊 Security Metrics Integration

Captures comprehensive security data including device risk scores, exposure levels, and last communication timestamps for governance visibility.

Technical Requirements

Azure Infrastructure

  • Azure Automation Account with managed identity enabled
  • Azure Arc-enabled servers to monitor
  • Microsoft Defender for Endpoint licensing and enrollment
  • PowerShell 7 runtime environment in Automation Account

What You Get

Complete solution package ready for deployment in your environment:

  • PowerShell automation script for Arc server discovery and MDE validation
  • Azure Automation runbook with scheduled execution capabilities
  • Microsoft Defender API integration with comprehensive error handling
  • Step-by-step deployment guide with RBAC configuration
  • Scalability guidance for large environments (1000+ servers)

Complete Implementation Guide

The full Azure Arc & MDE Integration solution includes:

  • Complete Azure Automation Account setup with managed identity configuration
  • Microsoft Defender API permissions and authentication setup
  • PowerShell runbook script with MDE enrollment validation
  • Azure Resource Graph query optimization for large environments
  • Automation scheduling configuration and monitoring setup
  • Security tag schema and Azure Policy integration examples
  • Troubleshooting guide and common error resolution steps
Member Resources: Access the complete implementation guide, PowerShell automation scripts, API configuration templates, and ongoing support through the member portal.

About the Author

Kaido Järvemets - Microsoft MVP

Kaido Järvemets

Microsoft MVP | Microsoft Hybrid-Cloud Security Expert

With over 15 years of experience in IT, cybersecurity, and Microsoft technologies, Kaido specializes in Microsoft Azure, Microsoft 365, and hybrid-cloud security solutions. As a Microsoft MVP since 2010, he has deep expertise in Configuration Manager, Enterprise Mobility, and Azure Hybrid & Security.

Kaido is a Microsoft Certified Trainer who has been traveling across Europe for the past 12 years, speaking at events including the Microsoft Management Summit and Midwest Management Summit. He founded User Group Estonia and System Center User Group Estonia, building strong communities of Microsoft technology professionals.

🎯 Specializations

Microsoft Security:
  • Microsoft Defender XDR
  • Microsoft Sentinel SIEM & SOAR
  • Microsoft Entra ID (Azure AD)
  • Microsoft Intune
Azure & Hybrid Cloud:
  • Azure Arc Services
  • Azure Log Analytics
  • Azure Automation
  • Hybrid Cloud Management

"I simplify the process and make each change meaningful. It's all about adopting modern solutions that replace archaic ones and make the workplace easier for everyone involved."